Trojan.Gen.2 Description
Type: TrojanTrojan.Gen.2 is a dangerous computer trojan that may represent security risk for the affected PC system and its network environment. Trojan.Gen.2 may try to establish connection with the remote host once it has infiltrated a computer system. Trojan.Gen.2 can aslo request other files from the Internet to the corrupted computer system. Trojan.Gen.2 often infects computer systems without your authorization at the background. Trojan.Gen.2 enables cyber-criminals to remotely access an influenced computer system. Trojan.Gen.2 can proliferate via network if the infected drive is shared at the network.
Aliases
7 security vendors flagged this file as malicious.
Anti-Virus Software
Detection
Symantec
Trojan Horse
Panda
Trj/Refpron.J
McAfee-GW-Edition
Trojan.Downloader.Gen2
McAfee+Artemis
Artemis!0A77CA4058B3
Ikarus
Backdoor.Win32.Refpron
Avast
BV:Malware-gen
AntiVir
TR/Downloader.Gen2
Technical Information
Screenshots & Other Imagery
SpyHunter Detects & Remove Trojan.Gen.2
File System Details
Trojan.Gen.2 creates the following file(s):
# | File Name | MD5 | Detection Count |
---|---|---|---|
1 | %System%\arking2.dll | N/A | |
2 | %System%\arking1.dll | N/A | |
3 | %System%\arking0.dll | N/A | |
4 | %System%\arking.exe | N/A | |
5 | r56ujxftyrsdjsxrgf46i5sgheh44.exe | 0ae9a1e5a7ddaf6222954d307edc2ae3 | 0 |
Registry Details
Trojan.Gen.2 creates the following registry entry or registry entries:
Registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\MADOWN
HKEY_LOCAL_MACHINE\Software\Trojan.Gen.2
Site Disclaimer
Enigmasoftware.com is not associated, affiliated, sponsored or owned
by the malware creators or distributors mentioned on this article. This article should NOT be
mistaken or confused in being associated in any way with the promotion or endorsement of malware.
Our intent is to provide information that will educate computer users on how to detect, and ultimately
remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on
this article.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.